Loading...
Share this Job

Lead Incident Responder - Cyber Fusion Center Job

Apply now »

Date: Oct 19, 2020

City: Newtown Square, PA, US, 19073

Company: SAP

Requisition ID: 237225
Work Area: Information Technology
Expected Travel: 0 - 10%
Career Status: Professional
Employment Type: Regular Full Time
 

COMPANY DESCRIPTION

SAP started in 1972 as a team of five colleagues with a desire to do something new. Together, they changed enterprise software and reinvented how business was done. Today, as a market leader in enterprise application software, we remain true to our roots. That’s why we engineer solutions to fuel innovation, foster equality and spread opportunity for our employees and customers across borders and cultures.
SAP values the entrepreneurial spirit, fostering creativity and building lasting relationships with our employees. We know that a diverse and inclusive workforce keeps us competitive and provides opportunities for all. We believe that together we can transform industries, grow economics, lift up societies and sustain our environment. Because it’s the best-run businesses that make the world run better and improve people’s lives.

 Lead Incident Responder – Cyber Fusion Center – Newtown Square, PA

 

An SAP Lead Incident Responder is a crucial front-line defender, leader of SAP’s digital enterprise. Our Incident Handlers are responsible for triaging critical security events detected by security monitoring operations, analyzing all available data to determine if a cyber-attack is occurring, scoping the extent of a suspected attack, coordinating efforts to contain attacks, and conducting forensic investigation to determine the details around the attack. 

 

The Role

 

Our incident handlers are responsible for triaging security alerts detected by Enterprise Detection and SIEM, analyzing all available data to determine if a cyber-attack is occurring, scoping the extent of a suspected attack, coordinating efforts to contain attacks, performing forensic investigations to determine the details around an attack, and providing guidance on remediation actions.

 

In this role, you will lead attack scope and root cause analysis, develop attack remediation strategies and ensure the communication and handle escalations of security activities. You will also assist in the development of incident handling processes, standard operating procedures, playbooks and runbooks. Through developing workflow automation, you will lower response times.

 

You will work with Enterprise Detection and SIEM teams to make improvements to detection and alerting mechanisms and conduct forensic investigations to determine incident details and provide supporting evidence. You will also act as a technical liaison for third party incident responders and develop templates for third party communications for legal review.

 

Role Requirements 

 

You should have extensive demonstrated experience in leading cyber-attack investigations and of working in a similar 24/7 environments managing cases with enterprise SIEM or Incident Management systems. Previous experience of leading multi-functional teams is also required.

 

We are looking for analytical, critical thinkers, who have an eye for detail and are solution orientated. You should be quick to learn and adapt and operate in a dynamic environment.

 

You will also need to have the following technical skills and experience:

 

  • Ability to possess and maintain a U.S. Government/DoD Clearance.
  • Security certification (e.g. Security+, GCIA, GCIH, CISSP)
  • Comprehensive knowledge APT actors; their tools, techniques, and procedures (TTPs)
  • Expert knowledge of TTP methods and frameworks
  • Expert knowledge of TCP/IP communications & knowledge of how common protocols and applications work at the network level, including DNS, HTTP, and SMB 
  • Expert knowledge of one or more
    • Windows/AD file system, registry functions and memory artifacts
    • Unix/Linux file systems and memory artifacts
    • Mac file systems and memory artifacts
    • Database, web application, cloud, or mobile device cyber incident response principals and techniques
    • Cybersecurity automation
    • Web servers and web applications.
    • SIEM (Splunk)
    • Security tools: IPS, Web proxy, Email proxy, pDNS, Deception, EDR etc....
  • Experience with one or more scripting languages (Powershell, Python, Bash, etc.)
  • Experience with integration of threat hunting and cyber threat intelligence into the incident response process
  • Experience with information security compliance audit frameworks and requirements e.g. PCI, FISMA, FedRAMP, SOC, SOX, PCI, GDPR and Data Privacy

 

#WorkWithMaxx

 

#SAPSecurityCareersSGS

 

#SOF2020

 

#TWUSA050820  

SAP'S DIVERSITY COMMITMENT

To harness the power of innovation, SAP invests in the development of its diverse employees. We aspire to leverage the qualities and appreciate the unique competencies that each person brings to the company.

SAP is committed to the principles of Equal Employment Opportunity and to providing reasonable accommodations to applicants with physical and/or mental disabilities. If you are interested in applying for employment with SAP and are in need of accommodation or special assistance to navigate our website or to complete your application, please send an e-mail with your request to Recruiting Operations Team (Americas: Careers.NorthAmerica@sap.com or Careers.LatinAmerica@sap.com, APJ: Careers.APJ@sap.com, EMEA: Careers@sap.com). Requests for reasonable accommodation will be considered on a case-by-case basis.

EOE AA M/F/Vet/Disability:

Qualified applicants will receive consideration for employment without regard to their age, race, religion, national origin, gender, sexual orientation, gender identity, protected veteran status or disability.

Additional Locations :


Nearest Major Market: Philadelphia

Job Segment: ERP, SAP, Linux, Database, Unix, Technology